![]() ![]() The best feature of the device really is just looking at the keychain assuming that OS X has left it open. All this software is doing is looking for clues about user activity for the most part. No software can break standard encryption methods, it's just not possible to do, if it was you'd know about it by now and there would be a system update pretty quick. If you have information you want to protect, keep that information offline and/or encrypt it. įirst you should consign yourself to the fact that no computer is invulnerable to an attack.I think you folks provide a great service on this forum and to the Mac community in general. This should not be unlocked by default when a user logs in.") Second, in light of the "forensic" programs described in this thread, is there anything Apple should be doing to modify the architecture of OS X that can prevent such programs from being used by malicious individuals to exploit our machines? (PB mentioned one "Apple should reconsider its policy about Keychain. I have a 2 part question for Chucker, PB, Marvin and the other trusted developer sources on this forum.įirst, in light of what happened at CanSecWest (see the Dino Dai Zovi email interview with John Gruber of Daring Fireball), what advice would you give to the non-developer user to maximally protect their machine (Dai Zovi provides what seems to me to be very wise advice in his responses)? Otherwise, we have a problem here Houston.Īs a non-developer, this thread has me very worried about vaunted Mac Security,as does the email interview with Dino Dai Zovi by John Gruber of Daring Fireball. The price point indicates that there is something much less trivial than Keychain, but this is just an indication and nothing more. To be honest, and as it was apparent from my posts, I did not well understand what all this is about and how it works. This should not be unlocked by default when a user logs in. Oh, no! I think that Apple should reconsider its policy about Keychain. Otherwise, we have a problem here Houston. ![]() ![]() Whatever the case, I would appreciate if someone could prove me wrong. Like I said, however, I have indeed come across apps that, unfortunately, place it in there. Instead, all I see is mechanisms that work just the way they are supposed to, with the one exception that you shouldn't be able to find the root password in keychain. And if there was something, it would make for a compelling (and perhaps justified in price) piece of software, but it would also raise a lot of questions the morals of its developers, since it would imply security holes that they should have reported to Apple long ago. I just haven't found anything in the description yet that makes me wonder 'how do they do that?'. ![]()
0 Comments
Leave a Reply. |